136
Cryptography Cryptography By, Anthony Lonigro By, Anthony Lonigro & & Valentine Mbah Valentine Mbah

Cryptography By, Anthony Lonigro & Valentine Mbah

Embed Size (px)

Citation preview

CryptographyCryptography

By, Anthony LonigroBy, Anthony Lonigro

&&

Valentine MbahValentine Mbah

IntroductionIntroduction

• Cryptography is the enciphering and deciphering of messages in secret code.

• As time moves on cryptography is required to evolve and with the existence of computers, cryptography has become a key feature in the lifeline of

all developed countries.

Enigma MachineEnigma Machine

• Electrical pathways

• Custom Rotors

• Polyalphabetic substitution and One-time pads

• It’s breech was a momentous occasion in WWII

Importance of CryptographyImportance of Cryptography

• Almost all communications of sensitive data are done by software programs with file encryption capabilities.

• Without it, countries would fall.

• Used in digital signatures and credit card transactions over the internet.

Importance Continued…Importance Continued…

• Companies could not have online interfaces without it.

• Imagine if every sensitive piece of information you entered to the internet was easily accessible by hackers.

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

With CryptographyWith Cryptography

Hacker!!

With CryptographyWith Cryptography

Hacker!!

With CryptographyWith Cryptography

Hacker!!

With CryptographyWith Cryptography

Hacker!!

With CryptographyWith Cryptography

Hacker!!

With CryptographyWith Cryptography

Hacker!!

With CryptographyWith Cryptography

Hacker!!

With CryptographyWith Cryptography

Hacker!!

With CryptographyWith Cryptography

Hacker!!

With CryptographyWith Cryptography

Hacker!!

With CryptographyWith Cryptography

Hacker!!

With CryptographyWith Cryptography

Hacker!!

With CryptographyWith Cryptography

Hacker!!

Information safe!

Without CryptographyWithout Cryptography

Without CryptographyWithout Cryptography

Without CryptographyWithout Cryptography

Without CryptographyWithout Cryptography

Without CryptographyWithout Cryptography

Without CryptographyWithout Cryptography

Without CryptographyWithout Cryptography

Without CryptographyWithout Cryptography

Hacker!Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Without CryptographyWithout Cryptography

Hacker!

Hello World!

Information Compromised!

ExampleExample

• Plaintext = hello

• Encoded = ifmmp

• Every letter is transformed into the letter preceding it.

CiphersCiphers

• The mathematical algorithm used to encrypt a message is called a cipher.

• Types: Symmetric Key Cipher & Asymmetric Key Cipher.

Symmetric Key CipherSymmetric Key Cipher

• One Key

Encryption key = Decryption key

Asymmetric Key CipherAsymmetric Key Cipher

• Two Keys

Encryption Key != Decryption Key

Modern CryptographyModern Cryptography

• Quantum Cryptography

• Unlike other cryptography methods which rely on computational security, quantum cryptography uses every single particle of light, which is called a photon, to transmit data.

Modern Cryptography Cont..Modern Cryptography Cont..

• In old methods a couple photons could be intercepted and the users would not know.

• In Quantum Cryptography, if any photon is intercepted the data is transformed and the users are informed.

Parallel ProgrammingParallel Programming

• With parallel programming a hacker can use multiple key cracking algorithms.

• This makes it easier to crack keys that have lower encryption bits.

• With most of the

encryptions today,

a key can be broken in

O(2^n) time.

HackersHackers

• Even with a 56 bit encryption key, parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

QuestionsQuestions